Breaking News


What we learned selling subscriptions before they became trendy

Our decision to change from a perpetual licence model to subscriptions was one of the great naive moments in Yellowfin’s history. It was about eight years ago and we had great sales growth but it was getting harder to start from scratch every year and sell more perpetual licenses. At the same time, our maintenance business was growing so we decided to flip our model and sell subscriptions. It seemed like a good idea at the time as none of our competitors were selling subscriptions.

super monitoring

Top 10 Web Applications For your Business

Are you an entrepreneur and running a hefty business in today’s cutthroat competition? Do you ever wish to have an app that can solve all your mundane troubles? Well, the time has arrived where we have been using web application every single day for entertainment and business purpose. It is safer, faster and can be accessed from any device. By using applications more and more they help us to simplify a lot of daily tasks.


What is The Cyber Kill Chain?

The cyber kill chain illustrates the structure of a successful cyber attack. It is effectively the hacker’s process from beginning to end, from scoping a target (reconnaissance) all the way to achieving their objective, whether that’s data theft or dropping and executing malware. When approaching your cyber security strategy, you should align your defences to the cyber kill chain. Like Batman becoming fear, to defeat the hacker, you must become a hacker.


Why the Rise of DevOps Demands Continuous Optimization

The rise of DevOps has been wonderful. Now that developers and operations folk can work together in an agile setting, deployment windows are no longer stuck within slow, quarterly rhythms. Production deployments can occur hundreds of times every day, and companies can deliver features, fixes and updates in rapid fashion. Within an agile DevOps setting, Continuous Integration (CI), Continuous Delivery and Continuous Deployment (CD) have become established practices.


Generating a Heat Map with Twitter data using Pipeline Designer - Part 3

If you have got through part 1 and part 2 of this series of blogs, there are only a few more steps to carry out before you can see the end to end flow of data and create your Heatmap. If you have not read the first two blogs, the links to the blogs are above. Although these blogs have been quite lengthy, I hope you understand that I have tried to make sure that any level of experience can achieve this. Since Pipeline Designer is a new product, I felt that it made sense to be as explicit as possible.


How Grafana Labs Effectively Pairs Loki and Kubernetes Events

As we’ve rolled out Loki internally at Grafana Labs, we wanted logs beyond just simple applications. Specifically while debugging outages due to config, Kubernetes, or node restarts, we’ve found Kubernetes events to be super useful. The Kubernetes events feature allows you to see all of the changes in a cluster, and you can get a simple overview by just retrieving them: This also captures when nodes go unresponsive and when a pod has been killed along with the reason.


From vSAN to vCenter: Discover Complete Visibility into your VMware Stack with LogicMonitor

Hey folks, it’s that time of year again. I’m not talking about the end of summer; I’m talking about VMworld, of course! VMworld has been my jam for the last few years here at LogicMonitor, but this year I’m focused on some other cool projects hitting the market soon, including LM Exchange (you may have seen a sneak preview if you attended our inaugural user conference, Level Up).


How to Monitor Syslog Data with Sumo Logic

If you are reading this article, you’re probably familiar with syslog, a logging tool that has been around since the 1980s. It is a daemon present in most Linux-based operating systems. By default, syslog (and variants like rsyslog) on Linux systems can be used to forward logs to central syslog servers or monitoring platforms where further analysis can be conducted. That’s useful, but to make the very most of syslog, you also want to be able to analyze log data.


Sentry's Internal Integrations: Build internal tools that fit your workflow

Sentry helps developer teams build the most reliable software. Our help often manifests in two distinct forms: resolving issues in your product and ensuring that issue resolution fits seamlessly into existing workflows. We recently launched our Integration Platform, which allows developers to build publicly available tools on top of Sentry. For the launch, we built many new features, while also making it easier to use existing ones.